Geofence and Network Proximity

889
-1

Published on

Our presentation for ruSMART-2013.
Many of modern location-based services are often based on an area or place as opposed to an accurate determination of the precise location. Geo-fencing approach is based on the observation that users move from one place to another and then stay at that place for a while. These places can be, for example, commercial properties, homes, office centers and so on. As per geo-fencing approach they could be described (defined) as some geographic areas bounded by polygons. It assumes users simply move from fence to fence and stay inside fences for a while. In this article we replace geo-based boundaries with network proximity rules. This new approach let us effectively deploy indoor location based services and provide a significant energy saving for mobile devices comparing with the traditional methods.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
889
On Slideshare
0
From Embeds
0
Number of Embeds
40
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Geofence and Network Proximity

  1. 1. Geofence and Network Proximity Dmitry Namiot Lomonosov Moscow State University dnamiot@gmail.com Manfred Sneps-Sneppe ZNIIS, M2M Competence Center manfreds.sneps@gmail.com RUSMART 2013
  2. 2. • Many of modern location-based services are often based on an area or place as opposed to an accurate determination of the precise location. • Geo-fencing approach is based on the observation that users move from one place to another and then stay at that place for a while. • As per geo-fencing approach they could be described (defined) as some geographic areas bounded by polygons. • In this article we replace geo-based boundaries with network proximity rules. About
  3. 3. Contents Introduction Passive Wi-Fi monitoring Cloud Messaging Local area messaging mashup Conclusion
  4. 4. Passive Wi-Fi monitoring • Wi-Fi probe request • Client (even not connected) can send requests to AP • AP can analyze requests • We can collect MAC- addresses for clients
  5. 5. Advantages and disadvantages for passive monitoring • It does not require special mobile applications • For mobile users it works automatically and transparently • It is anonymous monitoring. MAC address is used for re-identification only. It could be replaced with some hash-code (privacy) • It is not 100% reliable. There is no warranty that Wi-Fi client will send probe request. Our own experiments and references show 70%-80% detection rate.
  6. 6. Passive monitoring examples Navizon
  7. 7. Passive monitoring examples. Cisco MSE
  8. 8. Passive monitoring examples. Libelium
  9. 9. Examples: visits per hour
  10. 10. Examples: devices
  11. 11. Cloud Messaging • Cloud infrastructure from vendor • Google, Apple, Microsoft, Nokia – own cloud based infrastructures for notifications • Google message: 4 Kb payload delivery
  12. 12. Google Cloud Messages
  13. 13. Key moments for Cloud Messaging • Application registers with Cloud Messaging • Application provides a key from Cloud Messaging server (subscribes) to the particular application (Sender) • Sender saves keys and uses them later for delivering notifications • Key moment – subscription is activated from the mobile application on the particular phone.
  14. 14. Spotique mashup • Let us extend the subscription process • Mobile application (mobile phone, actually) will provide a key for notification and MAC- address for identification • Sender can compare saved MAC- addresses with the MAC-addresses, collected by the passive monitoring • Key idea: get subscribers who are nearby at this moment
  15. 15. Spotique mashup - 2 • Server-side based schema for our SpotEx model • Sender can deliver notifications to those, who are nearby only. • It is real-time detection • MAC-address is used for the re- identification only. So, it could be replaced with some hash-code (privacy)
  16. 16. Use cases • Proximity marketing • Deliver local area messages in retail • Hyper-local news delivery in campuses. Tested in Lomonosov Moscow State University • Smart Cities information delivery
  17. 17. Conclusion • A new mashup based on passive Wi-Fi monitoring forA new mashup based on passive Wi-Fi monitoring for mobile devices and cloud based notifications.mobile devices and cloud based notifications. • Passive monitoring uses probe requests from Wi-FiPassive monitoring uses probe requests from Wi-Fi specifications for detecting nearby clients.specifications for detecting nearby clients. • Notification module uses cloud messaging (pushNotification module uses cloud messaging (push notifications) from mobile operational systems.notifications) from mobile operational systems. • This application does not publish location info in theThis application does not publish location info in the social network (it is not a check-in).social network (it is not a check-in). • Custom messages will target online subscribers inCustom messages will target online subscribers in the nearby area only.the nearby area only.
  18. 18. About us International team: Russia - LatviaInternational team: Russia - Latvia ((Moscow –Moscow – Riga – VentspilsRiga – Ventspils).). Big history of developingBig history of developing innovative telecom and software services,innovative telecom and software services, international contests awardsinternational contests awards Research areas are:Research areas are: open API for telecom,open API for telecom, web access for telecom data,web access for telecom data, Smart Cities,Smart Cities, M2M applications, context-aware computingM2M applications, context-aware computing..

×